CVE-2025-1302
Published: 15 February 2025
Description
Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).
Security Summary
CVE-2025-1302 is a Remote Code Execution (RCE) vulnerability in versions of the jsonpath-plus npm package prior to 10.3.0, caused by improper input sanitization and the unsafe default usage of eval='safe' mode. This flaw allows attackers to execute arbitrary code on affected systems and is classified under CWE-94 (Code Injection), with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants high confidentiality, integrity, and availability impacts, enabling full arbitrary code execution on the host running the vulnerable jsonpath-plus instance.
Advisories recommend updating to jsonpath-plus version 10.3.0 or later, which includes a fix via commit 30942896d27cb8a806b965a5ca9ef9f686be24ee in the JSONPath-Plus repository. Snyk's vulnerability report (SNYK-JS-JSONPATHPLUS-8719585) confirms this as an incomplete patch for the prior CVE-2024-21534.
Details
- CWE(s)